Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
d33c2d8b0bc1d356f79ba1d17bfd5e6d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d33c2d8b0bc1d356f79ba1d17bfd5e6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d33c2d8b0bc1d356f79ba1d17bfd5e6d_JaffaCakes118.html
-
Size
101KB
-
MD5
d33c2d8b0bc1d356f79ba1d17bfd5e6d
-
SHA1
80620130a66b3145d799fac46d63a1d163111072
-
SHA256
cfdee8b41e9608a7e0bd9265a43e72835452d7a4f9f7a033e6f7a1382439e706
-
SHA512
28e60e6f4bb1ef207c2da4405ee578abea46e66ae6f807ad42ccb1b2a00adf03ee35a1af04a9531c8a4ab644c86690f0bca557b54d61573eee49bb250bded18b
-
SSDEEP
3072:VdnvNv6w678ExZLhz1NWm95ycAKg95ycAKveGB8fLWsVo2J:UwQ8ExZLhz1NWm95ycAKg95ycAKveGBC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602eb14e8e01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000aa9ab3e545ac52d0af644c120136df6746db30fecebef1ff5ce916e7b5383209000000000e80000000020000200000000efc356f7f4b3189e2a5d975ff8ca59db54b7d0bdbb206c2d925e9f57290464f200000004fa226484450e9f66254caf6a48d6bc30f37d3ddc9cc16c8ccc089a223f1291a40000000c0900a03c3eee5121a1fbfa87c11d4985c0efe62931e1341a4dbba1b7220a20ab7fab7a366eee79512a8ec1523d4b2ceff38e0d20ad49bed766d6b8ba4bb5994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7938B131-6D81-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431920700" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2624 2284 iexplore.exe 30 PID 2284 wrote to memory of 2624 2284 iexplore.exe 30 PID 2284 wrote to memory of 2624 2284 iexplore.exe 30 PID 2284 wrote to memory of 2624 2284 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d33c2d8b0bc1d356f79ba1d17bfd5e6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e86491233934f904668e05f2c80a490
SHA1319ab514d136d2524c04dcd663446a3f26989c4e
SHA256596bee4939475aca041a0027766ce5333533273b692d300b42299768aae92133
SHA512490db17f9012b06fc21018f450b1fc9ffa7152578ae80e443e180c6b6192cc524be15647615b935ce4d273261fead4574fbb752795e1a6709f386f3024098422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ff84a4fc2c71cf7c6f3568483bc2e8
SHA1121cf66f4cc65effc1b9653f53845b7156cbda2a
SHA25636420d6ce098e5dba3ec64a8a81862547d2646a0e558bc331ea47b7ad9dcf2dc
SHA51225c990e5437d8d4749cb5eb73fe0f04e91923f58116a685418606aeca212bb2eb1029123fe5a8ec521c8e6bf01da63eee18aa52fa13dde25adc84f392c4bf1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54673ce20be2de0adb7fa640b74b1d900
SHA1c4f2a61d9cbaeb443c6eb6184466b7ecb25927d0
SHA256ccced24c4f5f327bd6f295a33eb8a895f012364c6c08e9d1efec3b98f0b4d7c6
SHA51250ed0db658a907b86f18e1cad5cc228950500fd478703530dcfc0332489601acf2dd569e5e0f43141597e8701d7980c6f73dd792a50732d7cb696fe318364722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa95d2fe1a4cf246b5b05755d2af2c13
SHA17e1d7a1298c55056a645958337aca2a4f4b587b8
SHA256e11a5e1a847e4c5e0d4d35ad486708909e4e9adca680a0bdea217e8c8ff3745d
SHA512f4f3e03e5e48da512491870e19fb3e8aba20c53dbaf2975a13877d620725bf39302f98b9752d6fb11d7f4efe53cb5b52eef91d8905b09ce66c3f22e5bf7bd5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588232eaa3bb21291c02fa2fb381e42a0
SHA15a97eded21fb8191c2b89de83548be189c4272b4
SHA2562ede46b40c130f9d681d1d21dc5074461c7dfad75473c5a8bc781f2a4168ff76
SHA512a280914bebc841402d05d0304eb119e5cdb0bfa4481c6345593f3d703c0646de4b82532f55de62c739623a7c1489d4e12fcb7882a45958b4e8144015996743cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd111e25288ecd2d745857ef1cbaac6
SHA17dfeda4d06753d35d19acb9433d81e149c76aa32
SHA256ea6f4a3e49dda754660c96d2ad2c67c74ccda88737689930145e8b33181e90f6
SHA512deb80a8cc0e9509c00d64891ab7deb6e630fb78ced8d7db20913b801de3ac317636ab1a30c3a6fa7b9b507f920426a3f5ca79dba1e244114c62972d742a3795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03d2bd4404ac63b4b51ab74c44e1265
SHA15a3861ead75d5986095df32e15316f4c72216c1c
SHA2563eeb19dcb747071bec51fc97b737d2db8ed72c561578a38a9a8d5e39704fbee6
SHA5127c186673a448605216f82b1669081064ffb765a3c67f70d2facc612fc1bdb9515f13c1acb738946ff9756763e771e4787cdbbc33f5dc5de6c3ddafba462158b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87094153db92fe1a7b3ff5fa5edda66
SHA175e86bc2fcc0ee354d3a5a0ab4e6fd281d861b41
SHA256e19825f3a3cdedce52c2515064b99d7ef78ebc7a72d95aa04d984b26d300d37a
SHA5125cb312100a775908beb75aa6e2ebae486f68d30680648f2dbca3b813ff7258df1a9eb0ae5244c3f7a93c7a3e18c62812e6533a3a85e09b868cb6d2f0fd60f3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e625d6acc3d9a4152158d83a88654ad
SHA15b7be5f289f6bd9eab75bf22244d14284277e704
SHA256d83662ab8f932ca180de9c460a815075968e5f9dbda87ce780575e8cb621ebd5
SHA512c003675378c9a274b50120395b5f2d5d3df5a6a63cd6ab824acb8c7c4caa15cf74a5d93d2ac82f22f51a5c6158a7d73d507d8d177f7747eb3c31287bca840b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc91ce32a212b3d3238f071e341619d2
SHA1e4d3e8cf67b7a0c437085bd72751c05ac7a576c9
SHA256ce0009bd28df48d8682d3a940aa60d0f4563abdd2e8c5728d0cce45a8d33f641
SHA51293b2e434ec530db7de2068ec9317df73d5a36ff545adadd7fd8965b8343342d6de9794ccc1a5d54609f88af60aefba224f24d76c93fb00c7277b302b8e9946d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6e44ef96c3b08da59916b6ad36e6be
SHA12cc4eb11145893726baf21fb9597d19bdaca477a
SHA256fc2a93538cddf3a2b7801ed11278f4e14de6c3a0cf0357e6edea4a4b125c9a5d
SHA5120df70a8cbbdc1e4df9db3521f156ad81152c67f6c28ec7cb3de896a3dade74e81ac73f1b94da8e88554fbf52671aa97f131aa3a45fcfba162e4ca6f0fc0a2017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddc8885a1d2c68142df693565ea5d5f
SHA1b889b39e7c65c17ad17fcc09238e13b2f7f87e29
SHA25683dc369bf04793c00210f6a995792cf4e9c019c5d00efb8d6dbff62fcbe07b6b
SHA512de2629e1844f4a0d7f4336d29f2c65ff667cd0ae1d0168dc2a22eb840a6b894f19652c21f5ca67459ed7a4b807469213fed80756161fb26c93eb838611e1c669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a61d28ee9bde282d0433113d9da6ab
SHA1377e989b1e38d8d877b4e00e82fb2008f8782d02
SHA25643b7a790244abeb52548bbb8c860027d2b1dfcfea63b46fe6b6998dac82fdb48
SHA512d13126e6861a876bc9032252232360e0527dcd3b1adb3b8bfcaa3942a6248ce7155fd42afa78c9a61e89c14aac25106aeda98efe3be4eb4d4938ca2a94183794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372f3f450512a4820711d028a9bb3e5e
SHA1efb8400d437fa2c4bed4786295b0ba3ff7401c3a
SHA256517c7b989a8946fe42390fb90b2ec8ffc86ea4b7c23191cfb5e6c97d1efed186
SHA512e11b99508a45efcdc9d0223012b7619b46b74327d3f76e8cc211d1b7027c1d6976beae5d28d734309cab54bfabb2dae7cd407003560cd426734dfcfb578d140c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fd05fd84399d404de811267154586e
SHA1f35b063e279f92721d45d464cc5f60e02e995bb2
SHA256d24a4e3123753ccf5acf805da878f9e39320125abe7deff2011a0fde062561b9
SHA512c33cedea419ea2867b4ac4c7ac4b1dc4f6797719381f7734530d099e58213d98e0e08ab00d8c7fc13059ecb20e900729c3c63deebd5d8a976a405701a0345ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ae7646f2d7c9f446af21694391dac9
SHA185e69787a3c13d31a8d4eda3eb3374fd8e4ec5f3
SHA25610d1eaac995cb5c1ca4867e4998242bde0a14a9b958106f0673d882904440303
SHA512cbedfebcb3cd38bbaafb46b3b0647289cdf69ca61039e87e801456dbc53918512f65ae49e78e3fb5e6bfaeb0d495c0b91ec5025253fad7d690273f7c100fdc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7f2025d09b28f17b5b1453e7abba6b
SHA14bf739bd39e897eedc100a23242a501727103348
SHA2562ffc4ee5b774006126194d1bae1974231adb327002b0ad59fcd02d9c02cea124
SHA512ed8f5603c8729562c1d81142f708bc5dd5b04fed73adc5c5af2e16716eed46143ff5f2b9802e4c5df025c6bad8a4ab7f4a50345a0da342acb62db1d343847b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d8324beb4bf802a8f655b697a9db5a
SHA1f718fa6cb2abe77405e79123670da541759d8499
SHA256733e006771ec97cb69030224089b7b69ce4ec4dacab8f0586c5fa70e7345045b
SHA5124149021796e33ce64e3efce831552ac11489a2693212663733bb09441855197e1eafec829f4b7e331cd1bc27b7cac6ade97c171566ca9cdb1c2e3c52e3ebd12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac88cfe874411b29e604e5197a0805da
SHA1063f566300ca6586a4dbed1931c7e5f3027ea819
SHA256bd7ce20747c0d92916f2d8c681da061d7af0a13e7c2977531a791a73bead24c7
SHA5129ad37e1c6880e86807b43138613e1a246ac2e0583176d03e82a2262cf754672a5792e052eec06498659d5610cd5c34d2c58c0b2e6f96bd40a77cd2518f3bb297
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b